Information and communication technology : International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings /

This book constitutes the refereed proceedings of the International Conference on Information and Communication Technology, ICT-EurAsia 2013, and the collocation of AsiaARES 2013 as a special track on Availability, Reliability, and Security, held in Yogyakarta, Indonesia, in March 2013. The 62 revis...

Full description

Saved in:
Bibliographic Details
Corporate Authors: ICT-EurAsia (Conference) Yogyakarta, Indonesia); SpringerLink (Online service)
Group Author: Mustofa, Khabib; Neuhold, Erich J.; Tjoa, A Min; Weippl, Edgar R.; You, Ilsun
Published: Springer,
Publisher Address: Berlin ; New York :
Publication Dates: 2013.
Literature type: eBook
Language: English
Series: Lecture notes in computer science, 7804
LNCS sublibrary. SL 3, Information systems and application, incl. Internet/Web and HCI
Subjects:
Online Access: http://dx.doi.org/10.1007/978-3-642-36818-9
Summary: This book constitutes the refereed proceedings of the International Conference on Information and Communication Technology, ICT-EurAsia 2013, and the collocation of AsiaARES 2013 as a special track on Availability, Reliability, and Security, held in Yogyakarta, Indonesia, in March 2013. The 62 revised full papers presented were carefully reviewed and selected from a numerous submissions. The papers are organized in topical sections on e-society, software engineering, security and privacy, cloud and internet computing, knowledge management, dependable systems and applications, cryptography, privacy and trust management, network analysis and security, and multimedia security.
Item Description: International conference proceedings.
Includes author index.
Carrier Form: 1 online resource (xvi, 552 pages) : illustrations (black and white).
Bibliography: With bibliogr. references.
ISBN: 9783642368189 (electronic bk.)
3642368182 (electronic bk.)
3642368174 (print)
9783642368172 (print)
Index Number: TK5105
CLC: TP393-532
Contents: Information and Communication Technology- Eurasia Conference (ICT-EurAsia).
E-Society.
Translating the Idea of the eGovernment One-Stop-Shop in Indonesia /
A Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network /
Early-Detection System for Cross-Language (Translated) Plagiarism /
TransWiki: Supporting Translation Teaching /
Physicians' Adoption of Electronic Medical Records: Model Development Using Ability - Motivation - Opportunity Framework /
Software Engineering.
Software Development Methods in the Internet of Things /
SAT-Based Bounded Strong Satisfiability Checking of Reactive System Specifications /
OSMF: A Framework for OSS Process Measurement /
Analyzing Stability of Algorithmic Systems Using Algebraic Constructs /
Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning /
Security and Privacy.
On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries /
Semantic-Aware Obfuscation for Location Privacy at Database Level /
Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch /
CAPTCHA Suitable for Smartphones /
Code Based KPD Scheme with Full Connectivity: Deterministic Merging /
Cloud and Internet Computing.
Indonesian Digital Natives /
End-to-End Delay Performance for VoIP on LTE System in Access Network /
Mobile Collaboration Technology in Engineering Asset Maintenance - What Technology, Organisation and People Approaches Are Required? /
A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud /
Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational Institution /
Knowledge Management.
Information Systems Strategic Planning for a Naval Hospital /
Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System Technique /
A Data-Driven Approach toward Building Dynamic Ontology /
Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement /
Asian Conference on Availability, Reliability and Security (AsiaARES).
Dependable Systems and Applications.
Secure and Verifiable Outsourcing of Sequence Comparisons /
Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter /
On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML) /
DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation /
On Identifying Proper Security Mechanisms /
A Recovery Approach for SQLite History Recorders from YAFFS2 /
UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors /
SA4WSs: A Security Architecture for Web Services /
Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation /
A Test Case Generation Technique for VMM Fuzzing /
A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet /
A Proposal on Security Case Based on Common Criteria /
An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core Processors /
Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks /
Cryptography.
Anonymous Lattice-Based Broadcast Encryption /
Supporting Secure Provenance Update by Keeping "Provenance" of the Provenance /
New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation /
Provably Secure and Subliminal-Free Variant of Schnorr Signature /
A Block Cipher Mode of Operation with Two Keys /
On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing /
Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme /
Privacy and Trust Management.
A Simplified Privacy Preserving Message Delivery Protocol in VDTNs /
Confidentiality-Preserving Query Execution of Fragmented Outsourced Data /
Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control /
Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol /
A Real-Time Privacy Amplification Scheme in Quantum Key Distribution /
Network Analysis and Security.
CSP-Based General Detection Model of Network Covert Storage Channels /
Trustworthy Opportunistic Access to the Internet of Services /
Architecture of Network Environment for High-Risk Security Experimentation /
Emulation on the Internet Prefix Hijacking Attack Impaction /
Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction /
Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge /
An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs /
A Review of Security Attacks on the GSM Standard /
Multimedia Security.
An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation /
Image Watermarking Using Psychovisual Threshold over the Edge /
A Data Structure for Efficient Biometric Identification /
The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent Surveillance System /
Shifting Primes on OpenRISC Processors with Hardware Multiplier /